221
Published 2023
Springer Nature Switzerland
Table of Contents: ... -- Dynamic Computation Offloading and Resource Allocation for Multi-access Edge Computing Networks...

222
Published 2013
Springer Berlin Heidelberg
Table of Contents: ...Transactional Mobile Agents.- On the Security of Lv et al.’s Three-Party Authenticated Key Exchange...

223
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... Assignment for Grid Computing -- Implementation of a Heuristic Network Bandwidth Measurement for Grid...

224
Published 2008
Springer Berlin Heidelberg
Table of Contents: ... on the Amount of the Delay Measurement Load on the Home Agent in a Hierarchical Mobile IPv6 Network...

225
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... -- Optimal Relay Node Placement and Trajectory Computation in Sensor Networks with Mobile Data Collector...

226
Published 2009
Springer Berlin Heidelberg
Table of Contents: ...Middleware for Automated Implementation of Security Protocols -- Can RDB2RDF Tools Feasibily Expose...

227
by Sheng, Quan Z.
Published 2017
Morgan Kaufmann
Table of Contents: ... and evaluation of Web of Things systems -- Efficient and secure pull requests for emergency cases using a mobile...

228
Published 2022
Microsoft Press
Subjects: ...Cloud computing / Examinations / Study guides...

229 Table of Contents: ...: an introduction to E-LOTOS -- 9 A computer aided design of a secure registration protocol -- 10 Implementation...

230
Published 2007
Springer Berlin Heidelberg
Table of Contents: ... and Performance of Virtual and Execution Environments in FAIN -- Secure, Customizable, Many-to-One Communication...

231
by Rosenzweig, Gary
Published 2018
Que
Subjects: ...Tablet computers / fast...

232
Published 2002
Springer Berlin Heidelberg
Table of Contents: ...Information Model for Policy-Based Network Security Management -- Design and Implementation of One...

233
by Rosenzweig, Gary, Jones, Gary
Published 2016
Que
Subjects: ...Tablet computers / fast...

234
by Meyers, Mike
Published 2023
McGraw-Hill Education
Table of Contents: ... -- Speed -- Flow Control -- Port Mirroring -- Port Security -- Jumbo Frames -- Auto-Medium-Dependent...

235
Published 2024
Springer Nature Switzerland
Table of Contents: ... Transform Computing (Nagalakshmi) -- An Integrated Information Security Risk Assessment (IISRA) Approach...

236
Published 2006
Springer Berlin Heidelberg
Table of Contents: ... for Atomic Deployment of Management Policies in QoS-Enabled Networks -- Autonomics and Security -- Towards...

237
Published 2018
Springer International Publishing
Table of Contents: ...-Aware Software Video Encoding in Head-End -- Reducing Power Consumption in Mobile Terminals -- Software...

238
Published 2007
Springer Berlin Heidelberg
Table of Contents: ... Solution for a Self-organized P2P Network -- Internet Security Management -- Analysis of Diagnostic...

239
by Birch, Mark, Neil, Ian
Published 2023
Packt Publishing Ltd.
Table of Contents: ... -- Introduction -- Practice Exam Questions -- 2.1 Summarize various security measures and their purposes -- 2.2...

240
by Rosenzweig, Gary
Published 2019
Que
Subjects: ...Tablet computers / fast...